Hi,

I have been trying to get the openssl s_time command to measure the SSL
performance
despite the non-existing documentation and need some help.  All tests from
"make test"
complete successfully.

To set up the test client, I have copied our root cert file from my Apache
server to the client
side and have referred to this CA cert on the client side with the "-CApath
<path>" and
"-CAfile cacert.pem" command parameters.

When I run "openssl s_time" against my Apache server, I see handshakes but
no data being
transferred, something like
[<myprompt>]$ apps/openssl s_time -CApath . -CAfile cacert.pem -cipher
DES-CBC3-SHA
-new -connect <servername>:443
Collecting connection statistics for 30 seconds
tttttttttttttttttttttttttttttttttttttttttttttttt ...
tttttttttttttttttttttttttttttttttttttttttttttttt ...
tttttttttttttttttttttttttttttttttttttttttttttttt ...
tttttttttttttttttttttttttttttttttttttttttttttttt ...
tttttttttttttttttttttttttttt

508 connections in 1.61s; 315.53 connections/user sec, bytes read 0
508 connections in 31 real seconds, 0 bytes read per connection
[<myprompt>]$

I inserted a sniffer and found that the handshake aborts at the end. The
client sends a
key exchange message although the server did not send one - how can this
happen?
I do not understand this because the client key exchange msg is enciphered
with the
public key from a server key exchange msg, not with the public key from the
server cert!

The sequence is:
client hello V2

server hello
server cert + chain
server hello done

client key exchange                !!!! ???
client change cipher spec
client finished

server change cipher spec
server finished

ERROR,: Client has closed the socket, no data read from client

server sends closure alert (enciphered, so it must be closure)
server closes socket

I played with the -key and -cert parameters (taken from the source) in the
hope that they might change something on the client side but to no avail.
I generated a client key pair and signed it with my CA and let the key and
cert parameters point at these two files like:

apps/openssl s_time -CApath . -CAfile cacert.pem -key osslClt_1024.key
-cert osslClt_1024.crt -cipher DES-CBC3-SHA -new -connect
<sniffer_IP_adrs>:<port>
Collecting connection statistics for 30 seconds
tERROR
, the same sequence as above happens. I have set the sniffer to abort after
one
connection, therefore it stopped after one "t".

a) Any hints how I should set up the openssl s_time test ?

b) Any ideas about the surplus client key exchange? The CA cert, the server
cert and the client cert (where I referenced it) all have a 1024 bit
modulus.

Regards, Martin



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to